Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IT skills in the context of BigCo., , , and . SIGCPR, page 9-18. ACM, (1998)Web Information Systems Management: Proactive or Reactive Emergence., and . Realigning Research and Practice in Information Systems Development, volume 194 of IFIP Conference Proceedings, page 163-182. Kluwer, (2001)Selection practices for Web-based government publications in state depository library programs: Comparing active and passive approaches., and . Gov. Inf. Q., 25 (1): 5-24 (2008)The distribution of computing: the knowledge markets of distributed technical support specialists., , and . Inf. Technol. People, 11 (2): 84-103 (1998)The limits of DeCSS posting: a comparison of internet posting of DVD circumvention devices in the European Union and China., , , , and . J. Inf. Sci., 31 (4): 317-331 (2005)Empowering users: Cultures and conflicts from social informatics perspectives (SIG USE)., , , , , and . ASIST, volume 41 of Proc. Assoc. Inf. Sci. Technol., page 586-587. Wiley, (2004)Can I email this? The use restrictions found in licensed digital resources.. ASIST, volume 44 of Proc. Assoc. Inf. Sci. Technol., page 1-13. Wiley, (2007)An assessment of access and use rights for licensed scholarly digital resources., and . JCDL, page 334. ACM, (2006)Librarian-initiated publications discovery: How do digital depository librarians discover and select web-based government publications for state digital depositories?, and . Gov. Inf. Q., 27 (3): 292-304 (2010)The customer is always right, but whose customer is more important?: Conflict and Web site classification schemes.. Inf. Technol. People, 16 (4): 419-439 (2003)